Featured posts

CI-ISAC Australia has been selected as the recipient of an Australian Government AUD6.4 million grant to create a health-specific, information-sharing…

Cybersecurity company Forescout Technologies has released its 2024 Threat Roundup report that provides an analysis of the evolving threat landscape.…

Vonahi Security, an automated network penetration testing company, is proud to announce its recent accreditation by CREST in Australasia. The…

Privacy professionals are under growing pressure as they face budget cuts, resource challenges and regulatory changes. According to ISACA’s State…

The Tech Policy Design Institute (TPDi) launched his week. It is Australia’s first independent think tank dedicated to technology policy.…

In the lead up to Zero Trust World 2025 we speak with Rob Allen, Chief Product Officer, ThreatLocker. ThreatLocker protects…

The Australian Cyber Security Centre (ACSC) has issued an alert about certain Fortinet products. The cybersecurity company has advised of…

ACS, the professional association for Australia’s technology sector, has announced ten new specialist occupations are now available under its Migration…

Threat actors are successfully targeting particular operational technology products rather than specific organisations when compromising operational technology components, according to…

Nearly half of Gen Z and Millennials have had their social media passwords hacked, according to the recently released 2024 State of…